Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
23 views4 pages

Css Unit 2

The document outlines the significance of mobile and wireless devices, highlighting their roles in communication, productivity, and e-commerce. It discusses the proliferation of these devices, security challenges, and various types of attacks, including credit card fraud and malware. Additionally, it emphasizes the importance of security policies and strategies to safeguard information systems in mobile computing.

Uploaded by

rohannic111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views4 pages

Css Unit 2

The document outlines the significance of mobile and wireless devices, highlighting their roles in communication, productivity, and e-commerce. It discusses the proliferation of these devices, security challenges, and various types of attacks, including credit card fraud and malware. Additionally, it emphasizes the importance of security policies and strategies to safeguard information systems in mobile computing.

Uploaded by

rohannic111
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cyber Security Unit - II Notes

1. Importance of Mobile and Wireless Devices

●​ Ubiquity and Accessibility: Mobile devices are omnipresent, enabling seamless


access to information and services.
●​ Communication and Connectivity: Facilitates voice calls, messaging, and multimedia
interactions, enhanced by 4G and 5G technologies.
●​ Productivity and Remote Work: Supports professionals in remote work through email
access, document management, and collaboration tools.
●​ E-commerce and Mobile Banking: Revolutionizes online shopping and financial
transactions via mobile apps.
●​ Education and Learning: Enables access to educational resources, online courses,
and collaborative learning.
●​ Navigation and Location-Based Services: GPS integration enhances mapping,
navigation, and location-based applications.
●​ Social Connectivity: Strengthens global communication through social media and
instant messaging apps.
●​ Healthcare and Wellness: Empowers health tracking and telemedicine through mobile
applications.

2. Proliferation of Mobile and Wireless Devices

●​ Widespread Adoption: Increasing dependency on mobile devices, propelled by


advances in wireless communication (4G, 5G).
●​ Global Connectivity: Instant access to data and real-time communication, reducing
geographical limitations.
●​ Impact on Business and Education: Boosts business efficiency and integrates
seamlessly into modern educational frameworks.

3. Mobile Computing, Wireless Computing, and Hand-Held Devices

●​ Mobile Computing: Portable devices enabling data access and exchange while in
transit.
●​ Wireless Computing: Uses wireless technologies to facilitate device communication
without physical connections.
●​ Hand-Held Devices: Small, portable devices (e.g., smartphones, tablets) designed for
convenient usage.

4. Trends in Mobility

●​ Enhanced Usability: Improved networking speeds and expanded application


functionalities.
●​ Popular Devices: Leading examples include Apple iPhones and Android-powered
smartphones.
●​ Security Challenges: Increased cyber threats necessitate robust security measures.

5. Types of Mobility and Implications

●​ User Mobility: Uninterrupted network access while on the move, introducing security
concerns.
●​ Device Mobility: Seamless movement between networks requires efficient handoff
protocols.
●​ Session Mobility: Uninterrupted session transitions across networks and devices.
●​ Service Mobility: Cross-platform access to services, requiring cloud and interoperability
support.

6. Attacks on 3G Mobile Networks

●​ Malware, Viruses, and Worms: Malicious programs compromising device security.


●​ Denial-of-Service (DoS): Overloading network resources, rendering them unavailable.
●​ Overbilling Attack: Manipulation of network protocols to generate fraudulent charges.
●​ Spoofed PDP: Unauthorized access by masquerading as a legitimate device.
●​ Signaling-Level Attacks: Disrupts communication protocols, leading to service
interruptions or eavesdropping.

7. Credit Card Fraud in Mobile and Wireless Computing

●​ Rising Incidents: Increased mobile usage has led to a surge in fraud cases.
●​ Prevention Measures:
○​ Do’s: Sign cards, maintain transaction records, change default PINs, verify
website authenticity.
○​ Don'ts: Avoid storing card details, lending cards, or signing blank receipts.
8. Security Challenges Posed by Mobile Devices

●​ Data Outside Secure Environments: Portability increases exposure to risks.


●​ Remote Access Risks: Higher chances of unauthorized access and data breaches.

9. Technical Challenges in Mobile Security

●​ Registry Settings: Secure configuration management.


●​ Authentication Security: Protection of PINs, biometrics, and login credentials.
●​ Cryptography: Encryption techniques for secure data storage and transmission.
●​ LDAP Security: Secure directory services used in mobile applications.
●​ RAS Security: Protection of remote access services.
●​ Media Player Security: Prevention of vulnerabilities in multimedia applications.
●​ Networking API Security: Securing application interfaces communicating over
networks.

10. Authentication Services Security

●​ Definition: Ensuring only authorized users and devices gain access.


●​ Types of Attacks:
○​ Push Attacks: Forced malware installations.
○​ Pull Attacks: Malicious content downloaded from unreliable sources.
○​ Crash Attacks: Exploiting vulnerabilities to cause application or device crashes.

11. Attacks on Mobile/Cell Phones

●​ Device Theft: Physical loss leading to unauthorized data access.


●​ Mobile Viruses: Malicious software impacting device performance.
●​ Mishing, Vishing, Smishing: Fraudulent phishing via SMS, calls, and messages.
●​ Bluetooth Hacking: Unauthorized exploitation of Bluetooth connections.

12. Security Implications for Organizations

●​ Device Management: Tracking and securing mobile devices, especially after employees
leave organizations.
●​ Unconventional Storage Risks: USB drives and external storage devices pose
potential threats.
●​ Lost or Stolen Devices: Increased risk of corporate data breaches.

13. Safeguarding Information Systems in Mobile Computing

●​ Database Encryption: Using robust encryption algorithms like AES and RSA for data
security.
●​ Mobile Device Security Strategy: Organizations must incorporate mobile security
measures and employee awareness programs.

14. Importance of Security Policies for Mobile Devices

●​ Data Protection: Policies ensuring safe handling of sensitive information.


●​ Network Security: Secure internet connections and VPN usage.
●​ Malware Defense: Best practices for secure browsing and app installations.
●​ Theft Protection: Remote wipe and encryption mechanisms to mitigate risks.

15. Operating Guidelines for Mobile Device Security

●​ Security Assessment: Determining the necessity of mobile devices within an


organization.
●​ Technology Implementation: Utilizing encryption, biometric authentication, and secure
passcodes.
●​ Standardization: Establishing security standards across all mobile devices.
●​ Inventory Control: Monitoring device usage and maintaining an up-to-date inventory.
●​ Training & Awareness: Educating users on mobile security best practices and potential
threats.

You might also like